BloodHound Version Feature Comparison Get started mapping Attack Paths in Active Directory and Azure today for free with open-source BloodHound Community. Understand the features in BloodHound Enterprise built for defenders and Identity teams to continuously monitor, prioritize and eliminate Attack Paths.
BloodHound Legacy
Where it all started: Six Degrees of Domain Admin
BloodHound CE
Map Active Directory and Azure Attack Paths
BloodHound Enterprise
Continuously Monitor, Prioritize, and Eliminate Attack Paths in Active Directory
Compare Features
Data collection
BloodHound Legacy
BloodHound CE
BloodHound Enterprise
Active Directory (AD)
Domain-joined Windows systems
EntraID (AzureAD)
Azure Resource Manager 
(AzureRM)
Microsoft Graph API
Current data statistics
User Rights Assignments (URA)
Historical data quality and trends
Data Collector Management
Scheduled data collection
Signed Data Collection Service
data ingestion
BloodHound Legacy
BloodHound CE
BloodHound Enterprise
Ingest data via UI
Ingest data via API
Data reconciliation
data Analysis
BloodHound Legacy
BloodHound CE
BloodHound Enterprise
Map Attack Paths between objects
Cypher search support
Entity (“node”) context panels
Attack Path (“edge”) context panels
Save your own custom queries
Export displayed graph
Pre-built Cypher queries
Automatically classify Tier Zero assets
Hybrid Attack Paths
Identify Tier Zero Attack Paths
Attack Path Exposure Measurement
Attack Path remediation guidance
Risk trend analysis and reporting
Architecture and Security
BloodHound Legacy
BloodHound CE
BloodHound Enterprise
Multi-user support with RBAC
2FA support
SAMLv2.0 support
Three-tier application with REST APIs
Fully-managed SaaS application
Support
BloodHound Legacy
BloodHound CE
BloodHound Enterprise
Access to BloodHound
 Slack Community
24/7/365 Enterprise Support
Assigned Technical Account Manager